On Wed, 16 Feb 2011 22:05 -0800, "Curtis Ward" <[email protected]>
wrote:
> I beg you for one now.

You seem to be confused about security. Your stated needs for
confidentiality conflict with your desire for  an out-of-the-box
solution. Do you realize that any phone manufacturer / mobile carrier
can sell phones that can be remotely controlled? This risk exists even
more for iOS than Android, since neither the operating system nor device
specification are open for scrutiny. Even with a GPG-aware mail client
someone could well monitor your key presses or screen remotely.

In short, don't use your mobile phone directly for secure communication.
The best you can get is tethering, ie connect your computer to a network
using the mobile phone as a network interface. Then you can tunnel
secure channels on top of this using your (presumably secure) computer.
-- 
Raphael 'kena' Poss

_______________________________________________
gpgtools-users mailing list
[email protected]
FAQ: http://www.gpgtools.org/faq.html
Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
Unsubscribe: 
http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1

This email sent to: [email protected]

Reply via email to